create-random-string revisited

Sabra Crolleton sabra.crolleton at gmail.com
Wed Oct 30 05:01:51 UTC 2013


Anton's argument seems compelling me. I agree.

Sabra


On Mon, Oct 28, 2013 at 2:43 AM, Edi Weitz <edi at agharta.de> wrote:

> FWIW, I completely agree with Anton.
>
> Cheers,
> Edi.
>
> On Mon, Oct 28, 2013 at 2:13 AM, Anton Vodonosov <avodonosov at yandex.ru>
> wrote:
> > First of all, even if you want to use ironclad for random strings,
> > there is no need to hardcode this in hunchentoot.
> >
> > Hunchentoot is designed to work with any random string generator.
> >
> > There is a variable hunchentoot:*session-secret*.
> >
> > You can initialize it to a random string, like this:
> >   (setf hunchentoot:*session-secret* (format nil "~A"
> (ironclad:strong-random cl:most-positive-fixnum))
> > Or, if you want to use the SSL number generator:
> >   (setf hunchentoot:*session-secret* (format nil "~A"
> (secure-random:number cl:most-positive-fixnum))
> >
> > Only if you left hunchentoot:*session-secret* uninitialized,
> > hunchentoot will initialize it using hunchentoot::create-random-string,
> > which is based on cl:random. And hunchentoot issues a warning in this
> case.
> >
> > 28.10.2013, 03:09, "Ron Garret" <ron at flownet.com>:
> >> The best pseudo-random number generator in the world might be
> completely unacceptable in a crypto application if you don't seed it with
> enough entropy.
> >
> > Exactly. Ironclad today uses /dev/random or /dev/urandom to seed the
> > random number generator with initial entropy.
> >
> > But on Windows, ironclad only has this:
> >
> >   ;; FIXME: this is _untested_!
> >   #+(and win32 sb-dynamic-core)(sb-win32:crypt-gen-random num-bytes)
> >
> > Otherwise, an error is signaled:
> >   #-(or unix (and win32 sb-dynamic-core))(error "OS-RANDOM-SEED is not
> supported on your platform.")
> >
> > Also, not all unix-like systems have /dev/random.
> >
> > OpenSSL has more ways to gather initial enthropy, for example
> > it knows how to interact with Entropy Gathering Daemon.
> >
> > That's why I think hardcoding Ironclad is not desirable today - it will
> be too limiting.
> >
> > Probably, hunchentoot documentation about hunchentoot:*session-secret*
> > may be improved, so that users don't have these questions.
> >
> > Best regards,
> > - Anton
> >
> >
> >
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.common-lisp.net/pipermail/tbnl-devel/attachments/20131029/81c7483f/attachment.html>


More information about the Tbnl-devel mailing list